Things to consider in an enterprise computing environment like in the MPI CBS

Permanent Link: topicbacklinks

Overview

Computers in an enterprise environment are different compared to the ones at home. Users do have less degrees of freedom but they get certain guarantees. This page describes the pros and cons of that fact on the Linux workstations and compute servers of this institute. It might be slightly different in other research facilities or companies.

The topics below are marked with (+) (advantage) and (-) (disadavantage).

Pros and Cons of an enterprise environment

(+) Roaming between workstations

Permanent Link: topicbacklinks

You are able to login on any Linux computer. Your computer is broken? While it's being repaired, use the one of your colleague who's currently on vacation. Since your user profile resides on a server in our network, you're not bound to a single machine.

You may even login multiple times. However, your Browser can only be opened in one of these sessions.

(-) Network-Dependency

Permanent Link: topicbacklinks

Computers in our network are mostly useless without a network connection. Since your personal stuff is stored on a server and your programs access this storage area directly, your workstation's network connection is a hard dependency.

(+) Data protection, access permission enforcement

Permanent Link: topicbacklinks

The IT department takes care of protecting your data and securing its integrity. This includes:
  • Regular automatic backups (Snapshots) of your data
  • Predicting failure of Workstation disks as early as possible
  • Enforcing access restrictions on sensitive data. Nobody will get access to your data if not properly authorized—e.g. by you, your superior, an institute director or a court order.

However, physical resource limitations restrict the data volume IT is able to handle and to protect. This is why users have to carefully separate important (irreplacable) from other (replacable) data. Have a look at our Data Protection Policy for more information.

(-) Restricted Network access

Permanent Link: topicbacklinks

You're not allowed to connect your laptop computer to the internal network. This is necessary to protect our test subject's data and less security optimized operating systems from unknown software on these machines.

However, you may connect your laptop/tablet/phone to our WiFi network. You might want to check out the Eduroam access model which grants access to a lot of other institute's WiFi networks.

(-) Artificially restricted memory

Permanent Link: topicbacklinks

Storage on disks and memory on compute servers are being used by multiple users concurrently. IT has to make sure, a single user cannot negatively influence other users, by i.e. filling up an important Harddisk completely. This is why there are
  • Disk quotas on Homedirectory storage
  • Mailbox quotas on our mailserver
  • Storage limits on all storageblocks in /data and /afs

(+) Software Consistency

Permanent Link: topicbacklinks

See SoftwareServiceLinux

(+) Stable file path names

Permanent Link: topicbacklinks

Several storage systems of the institute Data Protection Policy are guaranteed to never change their path names (stable namespace). Such a guarantee is very costly in terms of IT man hours which is why it cannot be given for all the storage types in the institute. Rules of thumb:
  • /data is stable
  • /afs is stable
  • /NOBACKUP* cannot be guaranteed to be stable
You might find the command STORAGEPOLICY to be helpful.

(-) Mandatory updates and upgrades

Permanent Link: topicbacklinks

IT is obligated to do security upgrades on all institute computers. Within a given platform generation, updates are done in the background without you noticing. No functional changes are introduced by such updates to computational packages. A given platform generation is only supported for a limited time - currently four years.

When security support for a platform fades out, IT has to re-install ("upgrade") a computer (i.e. your desktop PC). This is not optional! IT will remove computers without security upgrades from the internal network.

(-) Virtual trash doesn't work as expected

Permanent Link: topicbacklinks

While it's a very good idea to use a virtual trash at home as additional protective layer against accidental file removal, this concept doesn't work well in an enterprise environment like the MPI/CBS. In such a place
  • ...available storage is compartmentalized into different storage blocks with different quota limits assigned. This makes it hard for programs to keep track of the different physical folders, the virtual trash resides in.
  • ...different users are working cooperatively on lots of storage blocks. Some operating systems do not take that into account (one virtual trash per user per storage block)
  • ...multiple operating systems that have different strategies of how to express virtual trash in special folders are accessing the same storage.

Therefore MPI/CBS IT (like other enterprise IT depts.) uses a different approach: Snapshots and backups. If you want to restore deleted files, please write a ticked specifying the location of the file (file path), the name of the file, and the last time the file existed for sure (where, what, when).

(-) Data ownership and permission updates

Permanent Link: topicbacklinks

For every piece of data in the institute it must be clear who gets to decide permissions for it. Only these people are then allowed to change permissions there.

See OtherPeoplesData

This topic: EDV/FuerUser > WebHome > EnterpriseComputing
Topic revision: 30 Jul 2024, wherbst
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding Foswiki? Send feedback